{"id":9255,"date":"2019-06-14T11:38:51","date_gmt":"2019-06-14T17:38:51","guid":{"rendered":"https:\/\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg"},"modified":"2019-06-14T11:38:51","modified_gmt":"2019-06-14T17:38:51","slug":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109","status":"inherit","type":"attachment","link":"https:\/\/sites.coloradocollege.edu\/careercenter\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109\/","title":{"rendered":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109"},"author":1306,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false},"class_list":["post-9255","attachment","type-attachment","status-inherit","hentry"],"jetpack_shortlink":"https:\/\/wp.me\/a79l8e-2ph","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"description":{"rendered":"<p class=\"attachment\"><a href=\"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?ssl=1\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"181\" src=\"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?fit=300%2C181&amp;ssl=1\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?w=860&amp;ssl=1 860w, https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?resize=300%2C181&amp;ssl=1 300w, https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?resize=768%2C464&amp;ssl=1 768w, https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?resize=600%2C363&amp;ssl=1 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" data-attachment-id=\"9255\" data-permalink=\"https:\/\/sites.coloradocollege.edu\/careercenter\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109\/\" data-orig-file=\"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?fit=860%2C520&amp;ssl=1\" data-orig-size=\"860,520\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?fit=300%2C181&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?fit=700%2C423&amp;ssl=1\" \/><\/a><\/p>\n"},"caption":{"rendered":""},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":860,"height":520,"file":"2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg","sizes":{"thumbnail":{"file":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109-150x150.jpg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?resize=150%2C150&ssl=1"},"medium":{"file":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109-300x181.jpg","width":300,"height":181,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?fit=300%2C181&ssl=1"},"medium_large":{"file":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109-768x464.jpg","width":768,"height":464,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?fit=700%2C423&ssl=1"},"wysija-newsletters-max":{"file":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109-600x363.jpg","width":600,"height":363,"mime_type":"image\/jpeg","source_url":"https:\/\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109-600x363.jpg"},"post-thumbnail":{"file":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109-220x126.jpg","width":220,"height":126,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?resize=220%2C126&ssl=1"},"expound-featured":{"file":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109-460x260.jpg","width":460,"height":260,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?resize=460%2C260&ssl=1"},"expound-mini":{"file":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109-50x50.jpg","width":50,"height":50,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?resize=50%2C50&ssl=1"},"full":{"file":"epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?fit=860%2C520&ssl=1","width":860,"height":520,"mime_type":"image\/jpeg","source_url":"https:\/\/i0.wp.com\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg?fit=860%2C520&ssl=1"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":null,"source_url":"https:\/\/sites.coloradocollege.edu\/careercenter\/files\/2019\/06\/epic-systems-vs-tata-case-key-security-questions-showcase_image-7-p-2109.jpg","_links":{"self":[{"href":"https:\/\/sites.coloradocollege.edu\/careercenter\/wp-json\/wp\/v2\/media\/9255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.coloradocollege.edu\/careercenter\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/sites.coloradocollege.edu\/careercenter\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/sites.coloradocollege.edu\/careercenter\/wp-json\/wp\/v2\/users\/1306"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.coloradocollege.edu\/careercenter\/wp-json\/wp\/v2\/comments?post=9255"}]}}